<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Nsx on The IT Hollow</title>
    <link>https://theithollow.com/tags/nsx/</link>
    <description>Recent content in Nsx on The IT Hollow</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 14 Jul 2020 14:16:18 +0000</lastBuildDate>
    <atom:link href="https://theithollow.com/tags/nsx/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>vSphere 7 with Tanzu - Getting Started Guide</title>
      <link>https://theithollow.com/2020/07/14/vsphere-7-with-kubernetes-getting-started-guide/</link>
      <pubDate>Tue, 14 Jul 2020 14:16:18 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/vsphere-7-with-kubernetes-getting-started-guide/</guid>
      <description>&lt;p&gt;VMware released the new version of vSphere with functionality to build and manage Kubernetes clusters. This series details how to deploy, configure, and use a lab running vSphere 7 with Kubernetes enabled.&lt;/p&gt;
&lt;p&gt;The instructions within this post are broken out into sections. vSphere 7 requires pre-requisites at the vSphere level as well as a full NSX-T deployment. Follow these steps in order to build your own vSphere 7 with Kubernetes lab and start using Kubernetes built right into vSphere.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Enable Workload Management</title>
      <link>https://theithollow.com/2020/07/14/enable-workload-management/</link>
      <pubDate>Tue, 14 Jul 2020 13:44:36 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/enable-workload-management/</guid>
      <description>&lt;p&gt;This post focuses on enabling the workload management components for vSphere 7 with Kubernetes. It is assumed that the vSphere environment is already in place and the NSX-T configuration has been deployed.&lt;/p&gt;
&lt;p&gt;To enable workload management, login to your vCenter as the &lt;a href=&#34;mailto:administrator@vsphere.local&#34;&gt;administrator@vsphere.local&lt;/a&gt; account. Then in the Menu, select Work&lt;/p&gt;
&lt;figure&gt;
    &lt;img loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2020/07/image-40.png&#34;/&gt; 
&lt;/figure&gt;

&lt;p&gt;Within the Workload Management screen, click the &lt;code&gt;ENABLE&lt;/code&gt; button.&lt;/p&gt;
&lt;figure&gt;
    &lt;img loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2020/07/image-30-1024x409.png&#34;/&gt; 
&lt;/figure&gt;

&lt;p&gt;The first screen in the wizard, will list your compatible vSphere clusters. These clusters must have HA and DRS enabled in fully automated mode. If you are missing clusters, make sure you have ESXi hosts on version 7 with HA and DRS enabled. You&amp;rsquo;ll also need a Distributed switch on version 7 for these clusters.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vSphere 7 with Kubernetes Environment and Prerequisites</title>
      <link>https://theithollow.com/2020/07/14/vsphere-7-with-kubernetes-environment-and-prerequisites/</link>
      <pubDate>Tue, 14 Jul 2020 13:42:33 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/vsphere-7-with-kubernetes-environment-and-prerequisites/</guid>
      <description>&lt;p&gt;This post describes the lab environment we&amp;rsquo;ll be working with to build our vSphere 7 with Kubernetes lab and additional prerequisites that you&amp;rsquo;ll need to be aware of before starting. This is not the only topology that would work for vSphere 7 with Kubernetes, but it is a robust homelab that would mimic many production deployments except for the HA features. For example, we&amp;rsquo;ll only install one (singular) NSX Manager for the lab where in a production environment would have three.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tier-0 Gateway</title>
      <link>https://theithollow.com/2020/07/14/tier-0-gateway/</link>
      <pubDate>Tue, 14 Jul 2020 13:39:41 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/tier-0-gateway/</guid>
      <description>&lt;p&gt;This post will review the deployment and configuration of a Tier-0 gateway to provide north/south routing into the NSX-T overlay networks.&lt;/p&gt;
&lt;p&gt;The Tier-0 (T0) gateway is where we&amp;rsquo;ll finally connect our new NSX-T backed overlay segments to the physical network through an NSX-T Edge which was previously deployed.&lt;/p&gt;
&lt;p&gt;The Tier-0 gateway will connect directly to a physical VLAN and on the other side to our T1 router deployed in the previous post. From there, we should have all the plumbing we need to route to our hosts and begin using NSX-T to do some cooler stuff. In the end, the network topology will look something like this:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tier-1 Gateway and NSX Segments</title>
      <link>https://theithollow.com/2020/07/14/tier-1-gateway-and-nsx-segments/</link>
      <pubDate>Tue, 14 Jul 2020 13:36:56 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/tier-1-gateway-and-nsx-segments/</guid>
      <description>&lt;p&gt;This post will focus on deploying our first NSX Gateway/Router and setting up our overlay segments. Before you can start these steps, the Edge nodes should be up and running so that they can support the Tier-1 gateways.&lt;/p&gt;
&lt;p&gt;NSX uses two types of routers/gateways. We&amp;rsquo;ll start by using a Tier-1 (T1) router. These routers are usually used to pass traffic between NSX overlay segments. We could create NSX segments without any routers, but it would require a router to pass traffic between these segments so we will create a T1 router first.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploy NSX-T Edge Nodes</title>
      <link>https://theithollow.com/2020/07/14/deploy-nsx-t-edge-nodes/</link>
      <pubDate>Tue, 14 Jul 2020 13:26:22 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/deploy-nsx-t-edge-nodes/</guid>
      <description>&lt;p&gt;NSX-T Edge nodes are used for security and gateway services that can&amp;rsquo;t be run on the distributed routers in use by NSX-T. These edge nodes do things like North/South routing, load balancing, DHCP, VPN, NAT, etc. If you want to use &lt;code&gt;Tier0&lt;/code&gt; or &lt;code&gt;Tier1&lt;/code&gt; routers, you will need to have at least 1 edge node deployed. These edge nodes provide a place to run services like the Tier0 routes. When you first deploy an edge, its like an empty shell of a VM until these services are needed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSX Pools, Zones, and Nodes Setup</title>
      <link>https://theithollow.com/2020/07/14/nsx-pools-zones-and-nodes-setup/</link>
      <pubDate>Tue, 14 Jul 2020 13:23:46 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/nsx-pools-zones-and-nodes-setup/</guid>
      <description>&lt;p&gt;In the &lt;a href=&#34;https://theithollow.com/2020/07/14/nsx-pools-zones-and-nodes-setup/&#34;&gt;previous post&lt;/a&gt; we deployed an NSX Manager. Now it&amp;rsquo;s time to start configuring NSX so that we can build cool routes, firewall zones, segments, and all the other NSX goodies. And even if we don&amp;rsquo;t want to build some of these things, we&amp;rsquo;ll need this setup for vSphere 7 with Kubernetes.&lt;/p&gt;
&lt;h2 id=&#34;add-an-ip-pool&#34;&gt;Add an IP Pool&lt;/h2&gt;
&lt;p&gt;The first thing we&amp;rsquo;ll setup is an IP Pool. As you might guess, an IP Pool is just a group of IP Addresses that we can use for things. Specifically, we&amp;rsquo;ll use these IP Addresses to assign Tunnel Endpoints (Called TEPs previously called VTEPs in NSX-V parlance) to each of our ESXi hosts that are participating in the NSX Overlay networks. The TEP becomes the point in which encapsulation and decapsulation takes place on each of the ESXi hosts. Think of it this way, when encapsulated traffic needs to be routed to a VM on a host, what IP Address do we need to send the traffic to, so that it can reach that VM. This is the TEP. We need to setup a TEP on each host, and the IP Addresses for these TEPs come from an IP Pool. Since I have three hosts, and expect to deploy 1 edge nodes, I&amp;rsquo;ll need a TEP Pool with at least 4 IP Addresses. Size your environment appropriately.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSX Installation</title>
      <link>https://theithollow.com/2020/07/14/nsx-installation/</link>
      <pubDate>Tue, 14 Jul 2020 13:18:52 +0000</pubDate>
      <guid>https://theithollow.com/2020/07/14/nsx-installation/</guid>
      <description>&lt;p&gt;This post will focus on getting the NSX-T Manager deployed and minimally configured in the lab. NSX-T is a pre-requisite for configuring vSphere 7 with Kubernetes as of the time of this writing.&lt;/p&gt;
&lt;h2 id=&#34;deploy-the-nsx-manager&#34;&gt;Deploy the NSX Manager&lt;/h2&gt;
&lt;p&gt;The first step in our build is to deploy the NSX Manager from an OVA template into our lab. The NSX Manager is the brains of the solution and what you&amp;rsquo;ll be interacting with as a user. Each time you configure a route, segment, firewall rule, etc., you&amp;rsquo;ll be communicating with the NSX Manager. Download and deploy the OVA into your vSphere lab.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSX Issues After Replacing VMware Self-Signed Certs</title>
      <link>https://theithollow.com/2017/03/13/nsx-issues-replacing-vmware-self-signed-certs/</link>
      <pubDate>Mon, 13 Mar 2017 14:05:58 +0000</pubDate>
      <guid>https://theithollow.com/2017/03/13/nsx-issues-replacing-vmware-self-signed-certs/</guid>
      <description>&lt;p&gt;Recently, I&amp;rsquo;ve been going through and updating my lab so that I&amp;rsquo;m all up to date with the latest technology. As part of this process, I&amp;rsquo;ve updated my certificates so that all of my URLs have the nice trusted green logo on them. Oh yeah, and because it&amp;rsquo;s more secure.&lt;/p&gt;
&lt;p&gt;I updated my vSphere lab to version 6.5 and moved to the vCenter Server Appliance (VCSA) as part of my updates. However, after I replaced the default self-signed certificates I had a few new problems. Specifically, after the update, NSX wouldn&amp;rsquo;t connect to the lookup service. This is particularly annoying because as I found out later, if I&amp;rsquo;d have just left my self-signed certificates in tact, I would never have had to deal with this. I thought that I was doing the right thing for security, but VMware made it more painful for me to do the right thing. I&amp;rsquo;m hoping this gets more focus soon from VMware.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 7 - Deploy NSX Blueprints</title>
      <link>https://theithollow.com/2016/03/09/vrealize-automation-7-deploy-nsx-blueprints/</link>
      <pubDate>Wed, 09 Mar 2016 15:10:20 +0000</pubDate>
      <guid>https://theithollow.com/2016/03/09/vrealize-automation-7-deploy-nsx-blueprints/</guid>
      <description>&lt;p&gt;In the &lt;a href=&#34;http://wp.me/p32uaN-1Cy&#34;&gt;previous post&lt;/a&gt; we went over how to get the basics configured for NSX and vRealize Automation integration. In this post we&amp;rsquo;ll build a blueprint and deploy it! Let&amp;rsquo;s jump right in and get started.&lt;/p&gt;
&lt;h2 id=&#34;blueprint-designer&#34;&gt;Blueprint Designer&lt;/h2&gt;
&lt;p&gt;Login to your vRA tenant and click on the Design Tab. Create a new blueprint just like we have done in the &lt;a href=&#34;https://theithollow.com/2016/01/28/vrealize-automation-7-blueprints/&#34;&gt;past posts&lt;/a&gt;. This time when you are creating your blueprint, click the NSX Settings tab and select the Transport zone. I&amp;rsquo;ve also added a reservation policy that can help define with reservations are available for this blueprint.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 7 - NSX Initial Setup</title>
      <link>https://theithollow.com/2016/03/07/6234/</link>
      <pubDate>Mon, 07 Mar 2016 15:01:03 +0000</pubDate>
      <guid>https://theithollow.com/2016/03/07/6234/</guid>
      <description>&lt;p&gt;Its time to think about deploying our networks through vRA. Deploying servers are cool, but deploying three tiered applications in different networks is cooler. So lets add VMware NSX to our cloud portal and get cracking.&lt;/p&gt;
&lt;p&gt;The first step is to have NSX up and running in your vSphere environment. Once this simple task is complete, a Distributed Logical Router should be deployed with an Uplink interface configured. The diagram below explains what needs to be setup in vSphere prior to doing any configurations in vRealize Automation. A Distributed Logical Router with a single uplink to an Edge Services Gateway should be configured first, then any new networks will be built through the vRealize Automation integration. While the section of the diagram that is manual, will remain roughly the same throughout, the section handled by vRealize Automation will change often, based on the workloads that are deployed. Note: be sure to setup some routing between your Provider Edge and the DLR so that you can reach the new networks that vRA creates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX – Firewall</title>
      <link>https://theithollow.com/2015/11/30/vrealize-automation-6-with-nsx-firewall/</link>
      <pubDate>Mon, 30 Nov 2015 15:08:27 +0000</pubDate>
      <guid>https://theithollow.com/2015/11/30/vrealize-automation-6-with-nsx-firewall/</guid>
      <description>&lt;p&gt;So far we&amp;rsquo;ve talked a lot about using our automation solution to automate network deployments with NSX. But one of the best features about NSX is how we can firewall everything! Lucky for us, we can automate the deployment of specific firewall rules for each of our blueprints as well as deploying brand new networks for them.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Use Case:&lt;/strong&gt; There are plenty of reasons to firewall your applications. It could be for compliance purposes or just a good practice to limit what traffic can access your apps.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX – Load Balancing</title>
      <link>https://theithollow.com/2015/11/09/vrealize-automation-6-with-nsx-load-balancing/</link>
      <pubDate>Mon, 09 Nov 2015 15:19:10 +0000</pubDate>
      <guid>https://theithollow.com/2015/11/09/vrealize-automation-6-with-nsx-load-balancing/</guid>
      <description>&lt;p&gt;If you&amp;rsquo;re building a multi-machine blueprint or multi-tiered app, there is a high likelihood that at least some of those machines will want to be load balanced. Many apps require multiple web servers in order to provide additional availability or to scale out. vRealize Automation 6 coupled with NSX will allow you to put some load balancing right into your server blueprints.&lt;/p&gt;
&lt;p&gt;Just to set the stage here, we&amp;rsquo;re going to deploy an NSX Edge appliance with our multi-machine blueprint and this will load balance both HTTPs and HTTP traffic between a pair of servers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX - NAT</title>
      <link>https://theithollow.com/2015/11/02/vrealize-automation-6-with-nsx-nat/</link>
      <pubDate>Mon, 02 Nov 2015 15:10:54 +0000</pubDate>
      <guid>https://theithollow.com/2015/11/02/vrealize-automation-6-with-nsx-nat/</guid>
      <description>&lt;p&gt;You&amp;rsquo;re network isn&amp;rsquo;t fully on IPv6 yet? Ah, well don&amp;rsquo;t worry you&amp;rsquo;re certainly not alone, in fact you&amp;rsquo;re for sure in the majority. Knowing this, you&amp;rsquo;re probably using some sort of network address translation (NAT). Luckily, vRealize Automation can help you deploy translated networks as well as routed and private networks with a little help from NSX.&lt;/p&gt;
&lt;p&gt;A quick refresher here, a translated network is a network that remaps an IP Address space from one to another. The quickest way to explain this is a public and a private IP Address. Your computer likely sits behind a firewall and has a private address like 192.168.1.50 but when you send traffic to the internet, the firewall translates it into a public IP Address like 143.95.32.129. This translation can be used to do things like keeping two servers on a network with the exact same IP Address.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX - Routed Networks</title>
      <link>https://theithollow.com/2015/10/26/vrealize-automation-6-with-nsx-routed-networks/</link>
      <pubDate>Mon, 26 Oct 2015 14:00:28 +0000</pubDate>
      <guid>https://theithollow.com/2015/10/26/vrealize-automation-6-with-nsx-routed-networks/</guid>
      <description>&lt;p&gt;Any corporate network thats larger than a very small business is likely going to have a routed network already. Segmenting networks improves performance and more importantly used for security purposes. Many compliance regulations such as PCI-DSS state that machines need to be segmented from each other unless there is a specific reason for them to be on the same network. For instance your corporate file server doesn&amp;rsquo;t need to communicate directly with your CRM database full of credit card numbers. The quickest way to fix this is to put these systems on different networks but this can be difficult to manage in a highly automated environment. Developers might need to spin up new applications which may need to be on different network segments from the rest of the environment. Its not very feasible to assume we can now spin up test and delete hundred of machines each day, but need the network team to manually create new network segments and tear them down each day. That wouldn&amp;rsquo;t be a nice thing to do to your network team.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX - Private Networks</title>
      <link>https://theithollow.com/2015/10/19/vrealize-automation-6-with-nsx-private-networks/</link>
      <pubDate>Mon, 19 Oct 2015 14:05:45 +0000</pubDate>
      <guid>https://theithollow.com/2015/10/19/vrealize-automation-6-with-nsx-private-networks/</guid>
      <description>&lt;p&gt;Of the types of networks available through NSX, private networks are the easiest to get going because they don&amp;rsquo;t require any NSX edge routers to be in place. Think about it, the NSX edge appliance is used to allow communication with the physical network which we won&amp;rsquo;t need for a private network.&lt;/p&gt;
&lt;p&gt;A quick refresher here, a private network is a network that is not connected to the rest of the environment. Machines that are on the private network can communicate with each other, but nothing else in the environment. Its simple, think of some machines connected to a switch and the switch isn&amp;rsquo;t connected to any routers. The machines connected to the switch can talk to each other, but thats it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Software Defined Networking with vRealize Automation and NSX</title>
      <link>https://theithollow.com/2015/10/12/software-defined-networking-with-vrealize-automation-and-nsx/</link>
      <pubDate>Mon, 12 Oct 2015 14:30:53 +0000</pubDate>
      <guid>https://theithollow.com/2015/10/12/software-defined-networking-with-vrealize-automation-and-nsx/</guid>
      <description>&lt;p&gt;This is a series of posts helping you get familiarized with how VMware&amp;rsquo;s vRealize Automation 6 can leverage VMware&amp;rsquo;s NSX product to provide software defined networking. The series will show you how to do some basic setup of NSX as well as how to use Private, Routed and NAT networks all from within vRA.&lt;/p&gt;
&lt;h2 id=&#34;vrealize-automation-6-with-nsx---nsx-setup&#34;&gt;&lt;a href=&#34;http://wp.me/p32uaN-1lT&#34;&gt;vRealize Automation 6 with NSX - NSX Setup&lt;/a&gt;&lt;/h2&gt;
&lt;h2 id=&#34;vrealize-automation-6-with-nsx---private-networks&#34;&gt;&lt;a href=&#34;http://wp.me/p32uaN-1lR&#34;&gt;vRealize Automation 6 with NSX - Private Networks&lt;/a&gt;&lt;/h2&gt;
&lt;h2 id=&#34;vrealize-automation-6-with-nsx---routed-networks&#34;&gt;&lt;a href=&#34;https://theithollow.com/2015/10/26/vrealize-automation-6-with-nsx-routed-networks/&#34;&gt;vRealize Automation 6 with NSX - Routed Networks&lt;/a&gt;&lt;/h2&gt;
&lt;h1 id=&#34;vrealize-automation-6-with-nsx---nat&#34;&gt;&lt;a href=&#34;http://wp.me/p32uaN-1qS&#34;&gt;vRealize Automation 6 with NSX - NAT&lt;/a&gt;&lt;/h1&gt;
&lt;h1 id=&#34;vrealize-automation-6-with-nsx---load-balancing&#34;&gt;&lt;a href=&#34;http://wp.me/p32uaN-1s2&#34;&gt;vRealize Automation 6 with NSX - Load Balancing&lt;/a&gt;&lt;/h1&gt;
&lt;h1 id=&#34;vrealize-automation-6-with-nsx---firewall&#34;&gt;&lt;a href=&#34;http://wp.me/p32uaN-1tu&#34;&gt;vRealize Automation 6 with NSX - Firewall&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2015/10/GuideLogo.jpg&#34;&gt;&lt;img alt=&#34;GuideLogo&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2015/10/GuideLogo-1024x543.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>vRealize Automation 6 with NSX - Initial Setup of NSX</title>
      <link>https://theithollow.com/2015/10/12/vrealize-automation-6-with-nsx-initial-setup-of-nsx/</link>
      <pubDate>Mon, 12 Oct 2015 14:00:22 +0000</pubDate>
      <guid>https://theithollow.com/2015/10/12/vrealize-automation-6-with-nsx-initial-setup-of-nsx/</guid>
      <description>&lt;p&gt;Before we can start deploying environments with automated network segments, we need to do some basic setup of the NSX environment.&lt;/p&gt;
&lt;h2 id=&#34;nsx-manager-setup&#34;&gt;NSX Manager Setup&lt;/h2&gt;
&lt;p&gt;It should be obvious that you need to setup NSX Manager, deploy controllers and do some host preparation. These are basic setup procedures just to use NSX even without vRealize Automation in the middle of things, but just as a quick review:&lt;/p&gt;
&lt;h3 id=&#34;install-nsx-manager-and-deploy-nsx-controller-nodes&#34;&gt;Install NSX Manager and deploy NSX Controller Nodes&lt;/h3&gt;
&lt;p&gt;NSX Manager setup can be deployed from an OVA and then you must register the NSX Manager with vCenter. After this is complete, deploy three NSX Controller nodes to configure your logical constructs.
&lt;img alt=&#34;NSXSetupManagementSetup&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2015/09/NSXSetupManagementSetup-1024x452.png&#34;&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
